Windows
Analysis Report
Laurier Partners Proposal.eml
Overview
General Information
Detection
Score: | 64 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64_ra
- OUTLOOK.EXE (PID: 6520 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \Root\Offi ce16\OUTLO OK.EXE" /e ml "C:\Use rs\user\De sktop\Laur ier Partne rs Proposa l.eml" MD5: 91A5292942864110ED734005B7E005C0) - ai.exe (PID: 6868 cmdline:
"C:\Progra m Files (x 86)\Micros oft Office \root\vfs\ ProgramFil esCommonX6 4\Microsof t Shared\O ffice16\ai .exe" "568 3E82F-A1AE -4D8F-BF62 -CB405ABCE 4BD" "C984 6EE5-A715- 4110-8CF9- B8DBCF5C0F 1A" "6520" "C:\Progr am Files ( x86)\Micro soft Offic e\Root\Off ice16\OUTL OOK.EXE" " WordCombin edFloatieL reOnline.o nnx" MD5: EC652BEDD90E089D9406AFED89A8A8BD) - chrome.exe (PID: 6372 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --st art-maximi zed --sing le-argumen t https:// yesyes-cad 3.powerapp sportals.c om/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4) - chrome.exe (PID: 6640 cmdline:
"C:\Progra m Files\Go ogle\Chrom e\Applicat ion\chrome .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --mojo-pla tform-chan nel-handle =2148 --fi eld-trial- handle=189 2,i,122926 2873057750 2130,93542 5926699599 3712,26214 4 --disabl e-features =Optimizat ionGuideMo delDownloa ding,Optim izationHin ts,Optimiz ationHints Fetching,O ptimizatio nTargetPre diction /p refetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_HtmlPhish_10 | Yara detected HtmlPhish_10 | Joe Security |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
Phishing |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: | ||
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | Joe Sandbox AI: |
Source: | OCR Text: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | Classification: |
Source: | HTTP Parser: | ||
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTP Parser: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | File created: |
Source: | File created: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: | ||
Source: | Section loaded: |
Source: | Key value queried: |
Source: | Window found: |
Source: | Window detected: |
Source: | Key opened: |
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: | ||
Source: | File created: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | File Volume queried: |
Source: | Process information queried: |
Source: | Queries volume information: |
Source: | Key value queried: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 31 Browser Extensions | 1 Process Injection | 1 Masquerading | OS Credential Dumping | 1 Process Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 13 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Registry Run Keys / Startup Folder | 1 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ripack.store | 199.188.207.168 | true | true | unknown | |
www.google.com | 172.217.19.228 | true | false | high | |
s-part-0035.t-0009.t-msedge.net | 13.107.246.63 | true | false | high | |
yesyes-cad3.powerappsportals.com | unknown | unknown | false | unknown | |
content.powerapps.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.113.194.132 | unknown | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
40.112.243.56 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.19.228 | www.google.com | United States | 15169 | GOOGLEUS | false | |
172.217.19.206 | unknown | United States | 15169 | GOOGLEUS | false | |
13.107.246.63 | s-part-0035.t-0009.t-msedge.net | United States | 8068 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
1.1.1.1 | unknown | Australia | 13335 | CLOUDFLARENETUS | false | |
172.217.17.78 | unknown | United States | 15169 | GOOGLEUS | false | |
13.89.179.14 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
172.217.17.35 | unknown | United States | 15169 | GOOGLEUS | false | |
52.111.252.18 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
20.42.65.85 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
239.255.255.250 | unknown | Reserved | unknown | unknown | false | |
172.217.17.74 | unknown | United States | 15169 | GOOGLEUS | false | |
64.233.162.84 | unknown | United States | 15169 | GOOGLEUS | false | |
142.250.181.99 | unknown | United States | 15169 | GOOGLEUS | false | |
52.109.76.243 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | false | |
199.188.207.168 | ripack.store | United States | 22612 | NAMECHEAP-NETUS | true |
IP |
---|
192.168.2.16 |
192.168.2.23 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1578697 |
Start date and time: | 2024-12-20 06:35:38 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultwindowsinteractivecookbook.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | stream |
Analysis stop reason: | Timeout |
Sample name: | Laurier Partners Proposal.eml |
Detection: | MAL |
Classification: | mal64.phis.winEML@18/51@16/92 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 52.113.194.132, 52.109.76.243
- Excluded domains from analysis (whitelisted): roaming.officeapps.live.com, ecs.office.com, s-0005.s-msedge.net, osiprod-neu-buff-azsc-000.northeurope.cloudapp.azure.com, ecs.office.trafficmanager.net, prod.roaming1.live.com.akadns.net, s-0005-office.config.skype.com, eur.roaming1.live.com.akadns.net, neu-azsc-000.roaming.officeapps.live.com, ecs-office.s-0005.s-msedge.net
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: yesyes-cad3.powerappsportals.com
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 231348 |
Entropy (8bit): | 4.388257124699157 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1DAB51593E5C3026E28BB10565D23B18 |
SHA1: | D4151E3E80DE09D38AA51A0C3A5FF0B4578CBD53 |
SHA-256: | 5EEE0BC571D0413255D391926CE52D7B330CA4880A0AD68E0AA617971FDE2AD8 |
SHA-512: | 0291979A825D763271F7F4E2B728AF31E3BB5C37C079699CEAE39A302BB42B2F576146613D5A66D4C36A38F04D448727BEF0430BE4F090B64564EAB9D4D670CF |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 32768 |
Entropy (8bit): | 0.04562918148302959 |
Encrypted: | false |
SSDEEP: | |
MD5: | CB09AA010D4172B5E52C7490A19019A9 |
SHA1: | EEE65056CFC12DB79C7F7C3C3FCF33F7B9DE5B92 |
SHA-256: | 90EEACBA5A0F1692E70BE0B7BF27A1414AB09BCC6E57697B76D84F5CD4514A8B |
SHA-512: | 8276FF8AFFA23C65433E002D4F2F0CE1AF952FD2A2C194F5EB3EE79332E904F7413B2876854ABB247D7FAF471593272E64077300F9BE830BDC3D5CBCE670FBE1 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 49472 |
Entropy (8bit): | 0.48322324199780053 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3A6EE0392C8C83E6E3E62ECEF297D378 |
SHA1: | 6C3B09392A409E4F687EF47D84016747BFE4766A |
SHA-256: | 5B09C4BB23316B4B4BAADE84356529F85AC62FFE43AD6F0374AAF780BDF445DF |
SHA-512: | 1BBB31A368A67ED3419237E59050E9C229BE50879D8E4AE7F9A085C9B64F7156F0528364280C4CB9A7766638D3B9FD8598805FD39A4040F0BBFF006B0455FF3F |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 88120 |
Entropy (8bit): | 7.843495936565491 |
Encrypted: | false |
SSDEEP: | |
MD5: | BEF99F2166A2267EA47FB36741341435 |
SHA1: | 887B7F97E4F1D12F77A89132842D3FEA3F8324E5 |
SHA-256: | 9E22358E8C45F9B7096001A784CE535AB7FAE1EA3505494DBDDA9C025D62FF65 |
SHA-512: | 2B199282B6B4EEF3C2771D72325AE5226C86D443CBE0AD9411D81BCA35546D391347A73DB46551C92B22126B8E445D58AF23FA085DF020E72410EAFEFE1F4A42 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{B0BE536F-8EC4-49B3-AE0D-786699398CA2}.tmp
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 3980 |
Entropy (8bit): | 2.915282689463852 |
Encrypted: | false |
SSDEEP: | |
MD5: | 06274070A403176868B228DEE19F5D6D |
SHA1: | 8717E5E41DF7A99557C18B881A5CDAE22E5ABB4D |
SHA-256: | F7054916BD4D30851C579EC03E11FB488C700C7560E2484598D1A835FB4E846B |
SHA-512: | F3011F74DE02EF1B138AF26F80398B6FC70F9E3948AD0210F3E1D04424D97FC22D09377146CBF37E9C213DCD4377C011D5D49599E4AFBA919EDFEEB9B716B48A |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1734672968965194400_0C23AED2-FDD4-4E32-B9D7-95CDD1A9215B.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.17730842251163717 |
Encrypted: | false |
SSDEEP: | |
MD5: | ABE27075234DADB8DF93014CABA5D02C |
SHA1: | FAAAEC0E8B4F4FBC034BB0848B2B9BF311CE307A |
SHA-256: | 3EA5C34F07DFE5A67E29C5EC27A86C878DCF90D3DC6575AE73AC8C625A1FBEAA |
SHA-512: | AEE317A8F9406208DD3EF16D96BB83A6810A180F6420115A3263EA31A24DFF6A00130C4D86537A3FC5A9E28FAC84AC1C08445025C32AEDFE81CE84F760FA46EF |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Diagnostics\OUTLOOK\App1734672968966172700_0C23AED2-FDD4-4E32-B9D7-95CDD1A9215B.log
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 20971520 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | |
MD5: | 8F4E33F3DC3E414FF94E5FB6905CBA8C |
SHA1: | 9674344C90C2F0646F0B78026E127C9B86E3AD77 |
SHA-256: | CD52D81E25F372E6FA4DB2C0DFCEB59862C1969CAB17096DA352B34950C973CC |
SHA-512: | 7FB91E868F3923BBD043725818EF3A5D8D08EBF1059A18AC0FE07040D32EEBA517DA11515E6A4AFAEB29BCC5E0F1543BA2C595B0FE8E6167DDC5E6793EDEF5BB |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Local\Temp\Outlook Logging\OUTLOOK_16_0_16827_20130-20241220T0036080722-6520.etl
Download File
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 102400 |
Entropy (8bit): | 4.468453872599358 |
Encrypted: | false |
SSDEEP: | |
MD5: | DC79EC8B08F5D04755C7B8D07BCBEED3 |
SHA1: | 2C01A75097FBB251074B37AA341196D331E4457F |
SHA-256: | 91A068410F900E87D9982DD11AF62BB3FE6B4AEDD940DAA704A4622975F79693 |
SHA-512: | 7E658630E4698A44921B6785F6E1297B01CD64042E6F21E47FDFE29CF769C2A097D1996BBDB4ECE84A8F52D37C124B1AA4DCA8C24457B2E71AD30D0328CE6F8E |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 30 |
Entropy (8bit): | 1.2389205950315936 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0E2DF0BB9E26A787FD06F065F790412E |
SHA1: | 19E34628ABA41DCCB4396334BD91183327E28FF2 |
SHA-256: | 5DBA85A1CC6B8DA1ADB6536D4EBD4A8A09FA3B7FAEAC67346C5BA62F0B7F0519 |
SHA-512: | 7A7D4A7C31D2F8775AEE72E99099DA09CE0D494CD3231DE30C333011FE6A0F8A3EF6E43420E80B42FFB73FFC961B69ADF30079441F9BCC1FED6324936E0F1337 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | modified |
Size (bytes): | 14 |
Entropy (8bit): | 2.699513850319966 |
Encrypted: | false |
SSDEEP: | |
MD5: | C5A12EA2F9C2D2A79155C1BC161C350C |
SHA1: | 75004B4B6C6C4EE37BE7C3FD7EE4AF4A531A1B1A |
SHA-256: | 61EC0DAA23CBC92167446DADEFB919D86E592A31EBBD0AB56E64148EBF82152D |
SHA-512: | B3D5AF7C4A9CB09D27F0522671503654D06891740C36D3089BB5CB21E46AB235B0FA3DC2585A383B9F89F5C6DAE78F49F72B0AD58E6862DE39F440C4D6FF460B |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2673 |
Entropy (8bit): | 3.9908714471473608 |
Encrypted: | false |
SSDEEP: | |
MD5: | DE43854547611902942506C7000949C5 |
SHA1: | 6F172FA05A512C058BDE44F832AD25A5C992B5CA |
SHA-256: | B6F0922A453F594D1E128928E8923805BD747DECF11A098DD36EA5D010CCB88D |
SHA-512: | 5C7720BCC2E4151F6A83EE26AA4DD2E3D742B2E6BB3CC8F67D81B219B5323169652D37E78060C64A072FF3721D9159120D77F33834E548018EDD4F1E8ABADB79 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2675 |
Entropy (8bit): | 4.008426798678194 |
Encrypted: | false |
SSDEEP: | |
MD5: | 204D96F589E048B5C20A593C95062012 |
SHA1: | 50160D8979B7F57E6FF0B078EE7D2491A13571D4 |
SHA-256: | 8168E8680A462565A34FB4A582CCA5C066E78282E96F909254C0972721A68005 |
SHA-512: | A6E8D21944B80B24AB9BB137B81FD1251BD7405BB752A701FC0CC51C7C5713B3C527161F4834C7EF88DA2F13B9496D2038EB7A0BE9AB94E852C977821BD1438B |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2689 |
Entropy (8bit): | 4.013591461813927 |
Encrypted: | false |
SSDEEP: | |
MD5: | F218395DF7AE31E9FCDEF20AB30D9733 |
SHA1: | FBED0472799C58889932E37EAC4B5728981BB7D1 |
SHA-256: | 58DEB0EFF7B246B0575A38D35257D613CB045AC79A10DA5EE3A70C322F2A7C58 |
SHA-512: | CF0463453531D8101AF7C067A2093F532847DF3506F1CBA69B689CDC0BD0B2035EF6C0C9F2EC85A143A1A294F0F5E3724DC26EEEDD4220AE43EB7A8FBE2A2538 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 4.003384999921152 |
Encrypted: | false |
SSDEEP: | |
MD5: | 43B933AA6EF3135C760F7BEDF04B6B0E |
SHA1: | E33D308340D0194AFC39CD9555906F0041A86C2D |
SHA-256: | 1CFEEF2A57A7D51507EA6EA3614768E5E0A5EF7489BDD73538AC0953B6DC9C76 |
SHA-512: | 553A255EFF252B51BF12D81835CC71C6641DCD614B313C5100B238021EAF39E408DF79D6D9526FF755F0BA3CF172F20DD60E049B3EB45AF09C5C9F5BB28A9DD2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2677 |
Entropy (8bit): | 3.9928513782690516 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1B4EDD5D6B074B76D0FC78154E4B9852 |
SHA1: | 32E5D8774DC83BED5166C92DCB9537ED4238E08B |
SHA-256: | 6E42CAE90014027585F353928C96A7F3E19C9D80BC9736D71D8F6BBE320BD14A |
SHA-512: | 21089C727DA5F4B708BBB7BE37B787D27A4E4540FCC6250AB91F45C4199D001AF7AD8BAF1763E42AD43662729DF1CC7DB38C4439C28DF52E58E6F86A284230BC |
Malicious: | false |
Reputation: | unknown |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Download File
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2679 |
Entropy (8bit): | 4.000158592060332 |
Encrypted: | false |
SSDEEP: | |
MD5: | A11AFE515D8C650DF99B3EF5024F82EE |
SHA1: | EE4776BE65DD6B944E20B6825343783DDF9988A0 |
SHA-256: | A18093425F7B9C5BD8AF4A083BC54DBAE9AE9B4EE9A352518691FC862BCD249F |
SHA-512: | E73034450D1CEB8C10740DB2E0497AC2F82D8279A1875339DCF4DC4A8D050D974C8C030ED17B64F7C1BB497F00942A365D3EF0EA550132C19CDB399AEA87B86B |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 271360 |
Entropy (8bit): | 4.72717903786791 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9070FC2D2BD60FDA61C57B3732EA1A46 |
SHA1: | D7CC224754E7D9A5B139828F97C851CE2587A3FF |
SHA-256: | 6ECBB39282D6D7D7D724A1CAF0E79DD3E595E98B17D5EE5EC662131241809B8F |
SHA-512: | 1102659E25E492E2A393D78469B597BA8D1200C032516B36AB44FD6346D25F98EEAE52D9200C904315CBED481EE2B530CA0173CBD19DD0C973C8EF1D10300857 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files (x86)\Microsoft Office\root\Office16\OUTLOOK.EXE |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 4.756647223927137 |
Encrypted: | false |
SSDEEP: | |
MD5: | 5FA0818DBF615CE0BD536C841D863C6A |
SHA1: | 7B07575E47E757406AE25C72517588FB687D54F5 |
SHA-256: | 9547096DD9A6E3F92119E1F7B1CAA207070195E386E50C882DC390CD6ACE5E95 |
SHA-512: | 14392B84EE8D8E78BB6DBA61EE4D0C31ECA23100605DEF3A44CC0654C2514CB3254B474AE8D8EF766B1D8E60D10C012F189D0B7BF1E50997D05EF08C7830BE98 |
Malicious: | true |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 30199 |
Entropy (8bit): | 5.084288947442727 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3030AEDCB4F044B0CC4A2E3B6DF00259 |
SHA1: | C74BAC96C68691D53E781054B0F83A4581F16E95 |
SHA-256: | 408F15E5BC6FF761D8AB50C8D3D318E4F9EB16A3E99E576EBC688CB4FC411634 |
SHA-512: | D5A2B2F790AB25FF25BE32591B61413DB6143DFDD8A150A0869D73187BD5836475A18B9597013A1ADFF39EBBB601CE6F7E9D0E1479B695B8BAA0E4F062D729E1 |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/_portal/a63ab577-516f-49f8-99f1-2b218b9f3a7a/Resources/ResourceManager?lang=en-US |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 11766 |
Entropy (8bit): | 4.903164552389703 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2659C6F064BBDF38AFF3A3F7D33BA256 |
SHA1: | 73EA787E226F755D9F57DC637AEB5A9D506338CF |
SHA-256: | E3A5A5E3432453A9CDCE2A02DD4D7F08037119C6A9AC545D010D3CF73768825A |
SHA-512: | F2508AE13D0E19E3BA856F919E05FCF731A2481C13D2FF99FB7843E7CA7CEAA37BE37D07E20C18CFDFE09A4B2DB9EA196A9C179B201C37C85A9F8146FF18D173 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/pcf-style.bundle-2659c6f064.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 16 |
Entropy (8bit): | 3.452819531114783 |
Encrypted: | false |
SSDEEP: | |
MD5: | CD598D2DCE38CFBA2981425AFD8CC5FF |
SHA1: | 56C8577B18B89C77A6AC58B925F8ECAB11BEF02C |
SHA-256: | 64BC0BCC655408713CCC3195B859007631C335758AAC8575658AC138509233E8 |
SHA-512: | 61797961E4747CA9CD7B3E6746E5243F7D9EF59B21B27911E974CEB68460C71ED438FEAAE6C7E1BC77A50E687D63A26623DB0AC1204DEAC60D094EFD0271C6FA |
Malicious: | false |
Reputation: | unknown |
URL: | https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTE3LjAuNTkzOC4xMzISEAnxM-LB8N2aHhIFDa8aOOA=?alt=proto |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 4807 |
Entropy (8bit): | 4.941343369031878 |
Encrypted: | false |
SSDEEP: | |
MD5: | 633E70F51B5C0319AF3ACF16EC1AE7B6 |
SHA1: | D28238721914C98998ACC0485CCEBF230F01A520 |
SHA-256: | FB076F7948CA70EB1F51334FE4C473C40BBE3BCEB105981C482BB8634FF98081 |
SHA-512: | 1509681E13367F0264CC341C1752B9EF7FFE0714098615282DB2B3688C24AF50D1052421DD606FCFCF942C0BE2D59B7694FA59150923F427FCD807530C56998A |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/client-telemetry-wrapper.bundle-633e70f51b.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 977847 |
Entropy (8bit): | 5.3506013175263405 |
Encrypted: | false |
SSDEEP: | |
MD5: | E303D5355313048BECBD7E9429825F82 |
SHA1: | 4ECFDB3DCA8F4AD156D0A0F12FB2ABBB1DBF6D67 |
SHA-256: | CED5EA5C04E6DD8807FA46B2052888EB4798E557C507FC2EC75463FEE17A9AEA |
SHA-512: | 2DD6CFF9B75FE25F1000CDC54F63209D11E9E90860F8CE23A492E1AFA28A7ADDB8E5262031BFF3772174F001ABFD19A5FD655AC562E4297667C8F4DA26B71AC7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/pcf-extended.bundle-e303d53553.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 48444 |
Entropy (8bit): | 5.284267981780026 |
Encrypted: | false |
SSDEEP: | |
MD5: | 6027D51DC3F9461C3B5AB3A1F8C5BEED |
SHA1: | 9787028F6B186F85580729694A1ED66DAE58B5F5 |
SHA-256: | C108037861ED8A7BD3CD188CC6DA3F7DC4103207B2C77B7E439F33DFA9334309 |
SHA-512: | 59D2F7FA229810027D9D82AFC1FB17FE20FE5172E596C204D274B65E5CA887A6FD4F9736787EE1413ACA4F7324198183FAB2F0D41D9889D3F0902E905A14B894 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/controls/host/448.462407f435.chunk.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 79435 |
Entropy (8bit): | 7.995978696659151 |
Encrypted: | true |
SSDEEP: | |
MD5: | 20ABD95082F377B19DA17651500BF0D1 |
SHA1: | 010531E7E691E689E79FC34906769FAF2BF11C12 |
SHA-256: | 37ED7BF95AADD9BF9078826A0C7223F36B14F027444AAFDDE60D3639592EE0ED |
SHA-512: | D83E280FAE6D5D293DAD204C4493F25C9CF51527B1E1A8473C50331CEE83FC799F1D6747AEAA3048A50C9C61A1B7C6F505443AEBB250274435F75EA53F699B9F |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/dist/client-telemetry.bundle-c71b2e2d47.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 856286 |
Entropy (8bit): | 5.353180762698638 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9183DA3D63ADCBCA9C451BB60E6E1F10 |
SHA1: | 9207557A291A137EF495DCEF25900E1E5D6F33AA |
SHA-256: | 66AA8F2E328C6461928C45E81A225A7C857185A6A27119BEBFD3F3C321AD555C |
SHA-512: | 4E2E8A538841E68A4ED206E324A9896A76EE678D0A4F36EE322786A46149EE4B3271A30262AAFD4713DD4C24AD34FD454BE114460169535A86455DCF891EAE62 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/pcf.bundle-9183da3d63.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 237 |
Entropy (8bit): | 6.43867499964275 |
Encrypted: | false |
SSDEEP: | |
MD5: | 74710B068526106916E5A9AE5B70FA64 |
SHA1: | 2E7344458A5EB6EFB65976EE144BBEDBA680B5AC |
SHA-256: | 55B9B171BB9BC15ACDD21C7A186E1268BC774B6A7C5A6FBC2F2BFEE564890325 |
SHA-512: | 6D66F49A52C8A4E0EEB0C4F67DC85CAFEE5C2F8716E8E80EB5BE6C266F4E7CFC161EA5B0937A383BA13B1DD5B97742D70FA9630A502F87BE622FF0512BA63047 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 13687 |
Entropy (8bit): | 4.882216091465932 |
Encrypted: | false |
SSDEEP: | |
MD5: | 3D8A58A48F40F6564C3F3668EEEE91A0 |
SHA1: | 0A99CC0043999807F879C16B1BECD13F36F71A56 |
SHA-256: | 31AD9CA96F5261E21E4EE2074153533E62A39AF0F1EBFA5B65F3B24F7F3CCC4A |
SHA-512: | C18DA8EE82005308B6037925298C53F838829ABB7392026FB3765AD430B59CD1E919AECB7280BAE39A8B4476D03D084F10FE54F8A427B5E4DBC6FB29FEBC82C3 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/font-awesome.bundle-3d8a58a48f.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 22704 |
Entropy (8bit): | 5.095523717383364 |
Encrypted: | false |
SSDEEP: | |
MD5: | 0BFBE4560787D9B36478E78E85DCC335 |
SHA1: | 0196FEFA9D6CFA29AE7C6DB281EAA8E5D18DF73C |
SHA-256: | 93CC26A0C8538C378CD1E4D2D45075B29CC1DF7632D2D36A5D0AA22D14D84AA2 |
SHA-512: | 3C221638232D07ABB67C1D2FE9BF15B1D7EAD5EAA30C23D72BB92894F078C2518E5CBD51D2C7EFDD76ED481BF5C280D53763864B781F45AFCD4099251809EBA7 |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/portalbasictheme.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 164673 |
Entropy (8bit): | 5.5275808716689285 |
Encrypted: | false |
SSDEEP: | |
MD5: | 184C77DA50998ED29B32136A393D3A3D |
SHA1: | B7977B0078AB08A7C3B1E58DFA8942CBF609F471 |
SHA-256: | E031F7BA25B1896ABE9459E418284BB862325453675EF7C27E6070BD6A538631 |
SHA-512: | 5F1DEF511EC6EC8E92158F32ADA2443948F0939421FA6472CC14F67755DCE345B1D05068E83523B20ECCF6E14863223DF661051404FE0969864C3DA16D63FE30 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 229949 |
Entropy (8bit): | 7.970123220907809 |
Encrypted: | false |
SSDEEP: | |
MD5: | 9AD944B84F4528F590619B60770A1894 |
SHA1: | 26F7E3F6883159EEBF8E974F0CE9F7E9D7D6E013 |
SHA-256: | 1266ABC1265E9704A9A9493FC3AAF5D2B049617722277CF50365985C757F40A5 |
SHA-512: | B31DFF4FBEE32980928DD3C442B37E13455EF66A0AE70D0831F95369BCC8CFB3DE21489BEC6F5B56818B51BF4FF1664306D5AC233DE801CA9E006A9912448EE6 |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/Screenshot%202024-11-04%20at%201.31.45%E2%80%AFPM.png |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4233 |
Entropy (8bit): | 5.181313852923847 |
Encrypted: | false |
SSDEEP: | |
MD5: | 7E882E84934F26C4A7F2531D9D68F4A6 |
SHA1: | 045ADE5B048BBDDFFE22E42FA7551CEC8DBD64A0 |
SHA-256: | D2FD30E73B65AC72EF27CFDF24CE2AC8D9A7AD67CF9B8316077E74D487E0B461 |
SHA-512: | 25BCC7003EC50E7D139C477F90F2B82362A6CB204179DE441D5EC409C2D5E59F03A0466EB014E3EEFDFF2719429D641DF6648FE4842F41DD22929593F032B121 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 80 |
Entropy (8bit): | 4.509183719779188 |
Encrypted: | false |
SSDEEP: | |
MD5: | F4A0E619B855697F4DB1A1B22FE37E8C |
SHA1: | 3D1CA30185839E05C6D876C7E8477604BFAC6CDA |
SHA-256: | CEC86F53B19C31BC124614007553A6EBC5434F9B1D2F03B1DB0393B22AB16EA2 |
SHA-512: | 8FF46BF8D3B93DA72109C92A26D5FF4C8E16FD6CD98FBB0E6A9E7E31E55220E8B2D71B851219199DF9C6D2074137192F55F84B4B89AF9C4C4D1B9D6FDB94EFC5 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/pcf-loader.bundle-f4a0e619b8.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 159279 |
Entropy (8bit): | 4.98674872017534 |
Encrypted: | false |
SSDEEP: | |
MD5: | CC9AC2928CA92A074A4D030AA0A7CF47 |
SHA1: | 7FA7E41EDF7BAAD566425038BDA364A32BF7A18A |
SHA-256: | 2070FCFFEFB64A1E7B163E157187B3F0B69D9C03AD8BB84EDD13D7CB639FF20B |
SHA-512: | EC5B9A3D4D0C3DD5582D74E1913BA0B8DF0EBCBCEE1AE5A3870188F6206F137E96330AE0EF968718BA6EE0B35D1F1384DBBD567B4936F9A444AE2B5574C428CD |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/bootstrap.min.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 108347 |
Entropy (8bit): | 5.048987215271787 |
Encrypted: | false |
SSDEEP: | |
MD5: | 07636D960562CF64047794C1D2147A0B |
SHA1: | 0BCFFC6C84C6F493F99D3E33380207A40CB3612B |
SHA-256: | 0327392292F6156C374969DFCF06F19C40914F414E201792D20A81B7D2EB9A90 |
SHA-512: | 09C7463AB26D04302307D286A528FD5F4C2AEC8588A7A4EEDCE0F7BC0D0E59A3FB8F3FB2E65A23D222E7A9051CA359DE3C58605883BD7B318FA36C3139778C91 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/preform.bundle-07636d9605.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8612 |
Entropy (8bit): | 5.4120605280870375 |
Encrypted: | false |
SSDEEP: | |
MD5: | 202B38276DB16E151E3875F0BD143E65 |
SHA1: | 9E9ADB227EF28E4988A2FDDA10E8C4721D7505B5 |
SHA-256: | 56751F03A556E9C29A3FDB26D53232698999EAC1DF96518BFC421E4BE86FF8C8 |
SHA-512: | 50D04843A99196F799BC3BD0201A944525A582D9558F2BAC9B81C7913E0CF0E5E9F7C6F908EA7BB6883C27D59F5B706706D5F842BA60AED45C807C4E05D2B870 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 43107 |
Entropy (8bit): | 5.26903329129244 |
Encrypted: | false |
SSDEEP: | |
MD5: | 805A1661B77834F61B0C8E1175DC9F90 |
SHA1: | 38E8EEB48DF5906F796E4C9A4549DFBF0327D656 |
SHA-256: | B37275F7C7F76430F05A20E7D0DDDAC3649467DBC0E7AF58CC3F04B1EE6DEA81 |
SHA-512: | 45004F96FB51B09AC26A409CA1BE79E48568026B1DEE9F0C55B6E5BB2958820AB96B3F6B5649E1BC7289D8E5D64334EA3882D7248926FE532AC7C7F2A7595142 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 583927 |
Entropy (8bit): | 5.2973870768859745 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4FDD3F639BAD493C4D7C82A7EF1EB48C |
SHA1: | A1249AF801F46B7FF03FE77A39954F62F2790939 |
SHA-256: | 34DE7832A2DFD7022F789C46FBBED4536CF69D7AD0F5FAFFAD7B7AF72C0DBBF5 |
SHA-512: | 39EA9B79DA7AEB7D69D7B99CE7D89B2579D7D9329999ED2C5A2925702DC3442C85F9AC8EC9E717EF1FD3833A83AF66E414CAA8E2C56A9924E478AD5BDDF28ED0 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 540 |
Entropy (8bit): | 5.0135089870329255 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2739C60227F87D19F5C784BFFB5991F8 |
SHA1: | 42DBAC51553D7778A176E710D3CE1009884DE167 |
SHA-256: | 974FECBEBCF2F295348C3631FE069966EAB4B4B57CD4FCBE15FB70D0ACAB47C6 |
SHA-512: | 42C81F41962FE4B5FA556EEDF1C9D9CB2F1D9D182D7BF29E2F8D69BE2CA5553E10D89893D4B8699D1E60FDAB19D1C5D9BC9C686C6C2DBC58DAB85070D43596CD |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/pwa-style.bundle-2739c60227.css |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 630768 |
Entropy (8bit): | 5.519196333314126 |
Encrypted: | false |
SSDEEP: | |
MD5: | 4D0031BC8253F908DEE9E7E390E0A781 |
SHA1: | 4D4423E16935874FABAF0172394BD1236AE6961D |
SHA-256: | BE1CE15C8FEA18D00704AE43377BF97853551BFDE3F9BA8860DE1CDB3CBC394B |
SHA-512: | 946A4F0F417621CA921A4136FD3679C4B0F08B62E4D2F88C9162226B66ED9685B09AF3C0B6086424A1DC978264DF20E8440A6EF5B59474A7A5982104F6CDD00E |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 1884 |
Entropy (8bit): | 5.189888619404054 |
Encrypted: | false |
SSDEEP: | |
MD5: | DFD19253D3DBC5521540512B5B2B05FB |
SHA1: | 63C7C12B96231EA61F6DF2DAFAF53FEBB20D627D |
SHA-256: | 810C0D1DE636403CE04DD194F9230C998613BA37D1496463648055B44E2B95F6 |
SHA-512: | 8EDBDB57FB7025B1E839887549341FC871F5A72EEF83DF46F65EC2DE3F1E3ACC1308EF1D0E91A91863B322E47AEE900221EBD793BC0B152712809A339FD8969A |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/controls/host/243.37970f022e.chunk.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 123137 |
Entropy (8bit): | 5.264209559921666 |
Encrypted: | false |
SSDEEP: | |
MD5: | 76D43A9405CE1A4618FF0A86BECBA682 |
SHA1: | 556ACEAE8396531440488D48302636CB02288CBC |
SHA-256: | D636393DA268FA543FC3F05A5405E53E26BF4101EA929ECCD401707B5A6C75B4 |
SHA-512: | 2BEFC43D0F4FC8B6E055ADB458DC07782EBF55FAE1E5C69CD03A8A6744D735180D56AABAF315743979511EF911C58167DD3D1890716D9EAE316604957C7A65C5 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7604 |
Entropy (8bit): | 5.300961596455194 |
Encrypted: | false |
SSDEEP: | |
MD5: | F1ACFD2815BECD7DF8E02C415B9973F7 |
SHA1: | 3CF9577A5B4CBA69C9646967B8855F7A2F137F80 |
SHA-256: | 99A2179570F5B6A4388F0175165C32018D8078E6F97F1591CF3426538361B4D7 |
SHA-512: | 14814E77F88AE5AB750D2D72A447F931FCBF8DB2AA95E77D91E7473C0982BA49FF9983DF6E137A52FFEDE3C490C6BA8948D411C3FCCFF2EDE561C21533690074 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 625 |
Entropy (8bit): | 7.484713757728487 |
Encrypted: | false |
SSDEEP: | |
MD5: | 1CCFEA34F655127024E56A9182D069B2 |
SHA1: | F01C37FC36D6F283021BFE2021F884756ACC0830 |
SHA-256: | DDEB1C61FE3FC1C4195D6AF3CA1514F8EB78DE09E6DE3DBFCC960DDFDA93EE54 |
SHA-512: | E54442CFC5247B8D7137EB2389CB1E9B66EA2CDF4DBD062BB680D51FB50323CBECB908A6764CA29CEAEBB057C1FEBEE0FB0D7A1E367030531B63CE92B0F9A0C6 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 353562 |
Entropy (8bit): | 6.0312012688630805 |
Encrypted: | false |
SSDEEP: | |
MD5: | 593B5DF6A4F8844D86E3A357CB7AC03C |
SHA1: | E6950FA15D52B7D61AA515EE0A8A744284DA00D5 |
SHA-256: | BF653CCAA339675FC30984E52FF16E3DD6E198FAE32DECBA1BAF7044BDF00107 |
SHA-512: | A99FA73DBEE15284829E289FD49CDB2B950615B42770794B0333D4E51A23E02892EE77781EC2AEC8E36FEB0E53E9D55441EB214F1B5BEBE1DD8F9D6D13706318 |
Malicious: | false |
Reputation: | unknown |
URL: | https://ripack.store/construct/sanga |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2859 |
Entropy (8bit): | 7.9113589947813105 |
Encrypted: | false |
SSDEEP: | |
MD5: | 2B04B89DC736FF2CC5BC45E7A8A24EC6 |
SHA1: | 3D1E3B6B35BD52C192935BD9012D05B2560F9F8B |
SHA-256: | A86B128160561F2D4D3B35AB94874F950918D4551B6036D707EB312A50805C69 |
SHA-512: | 0C332B48768F6EA334777D7E8820EB9F3F76F4864F2BD5386019C853F32B821F37D9A75C704C8F6E72677B37BBA19F11249B53794FA9AA708F81E788113EF88C |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 361 |
Entropy (8bit): | 4.6743574635866665 |
Encrypted: | false |
SSDEEP: | |
MD5: | EDA4E638FDD1B8DE8F97EC781E8242D6 |
SHA1: | A8C0716A4BCCF2805899403AF14E7B9216B19573 |
SHA-256: | 5423F185195F046D0F3893F674E072BE43E47C6124DD6CCBE214E896B1944D43 |
SHA-512: | 6B0BBB532CA0F901059517960261C0C6E1577B31F4E207C3909ABA5FA0D64E03C18E5EEE10F8A6773A4870CDFC3F0D642F761C8D8E7B6643D023161C23554BF2 |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 39685 |
Entropy (8bit): | 5.135776519349501 |
Encrypted: | false |
SSDEEP: | |
MD5: | 105A4995B8777AEAF68BFF64BF7D2AE0 |
SHA1: | E21390F730EB97D3D26B908AAACECD0A00A433E0 |
SHA-256: | A915D483B99AF421F4813E6B60599B4E39FAFF120E54B5E9838386D4AE1A4C60 |
SHA-512: | 6BEED488F5BC341194DF23CC5A1133EFFF442C30E0E80811FF7DAB1BBB73E809D1CA2A7A4FD02160364E8CE781BAA788C0F47C291946A32B06AF8E64435E74D8 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/dist/bootstrap.bundle-105a4995b8.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 277246 |
Entropy (8bit): | 5.189249848666887 |
Encrypted: | false |
SSDEEP: | |
MD5: | DAD47D7E411D7D72F49E4646BD3015B6 |
SHA1: | B6392232B187FB4B08F66AAA0EFF58A82CD2424B |
SHA-256: | 910EBC9835D267123DEA7D898FA5347884BF8E79D6453CE5EE1B1265B8ABC804 |
SHA-512: | D044D173A3BCB4BF42861AD738BB00BFF2AE94F61B09EFF59DA5FFC6BCC9682E875677C1350BBCF951D6FB9F68A2240F954ADBD4EA73FB3A422FB153A42CDEDC |
Malicious: | false |
Reputation: | unknown |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 42864 |
Entropy (8bit): | 5.18912803360478 |
Encrypted: | false |
SSDEEP: | |
MD5: | 197395E90DC9729F818EA9939E9C0F02 |
SHA1: | 44AB2D06F60067EDD19EDFC7150C4D8FF144BEB2 |
SHA-256: | E82600ABB85B8F5E55BC120B8FBA82ACD57C533C97FD6B843AD31FC75A255F56 |
SHA-512: | 1E4D7849F1E305BD8095BB25BE4F891C45A91E573071542A4FBE5E1FA3AB37D04CD59902781C328F04BA309F23F94DC7823A3D0CC864D9658E74C78C4E913466 |
Malicious: | false |
Reputation: | unknown |
URL: | https://content.powerapps.com/resource/powerappsportal/controls/host/170.c9e6b9a6e9.chunk.js |
Preview: |
Process: | C:\Program Files\Google\Chrome\Application\chrome.exe |
File Type: | |
Category: | downloaded |
Size (bytes): | 61640 |
Entropy (8bit): | 4.978709487228168 |
Encrypted: | false |
SSDEEP: | |
MD5: | C0E37B8D0E3ECE79376084F722FEE111 |
SHA1: | 2AA0095EE925CABFAD3C2FC758D28E322E27F1A7 |
SHA-256: | 89A2A5C7C4361D67AEB78FFB156337FB046F70B60A92336F809CF9CB29A9DC9E |
SHA-512: | 04DB76E721AE8E40980EF6D7C57BFA304EA10E0C4015204AB8927EBC929FFBF1F09C763C0AA78479FE589602F96299ECE7FC8597877D763F4475FF5DD1C5C758 |
Malicious: | false |
Reputation: | unknown |
URL: | https://yesyes-cad3.powerappsportals.com/theme.css |
Preview: |
File type: | |
Entropy (8bit): | 6.044375004138591 |
TrID: | |
File name: | Laurier Partners Proposal.eml |
File size: | 124'708 bytes |
MD5: | 05d116072230ff1d104dd7cc8c61878a |
SHA1: | 7357a791c968bc1b0ca512b9ea9ef83910676cef |
SHA256: | 2138bf71b1eec3041491d19431720da07dd2ed09957561c4564f1cd8e5f54cdd |
SHA512: | f52e252760a774f340d7f60c2f9c5f30c5a3f01b703f18fd9236323600644c4c70faf8f31fc79aef0fdc07405938e1efbcd47d93db58036a1c558db6f2b62033 |
SSDEEP: | 1536:HCER6AQ1nMHGQtapVL2/EA2F/fesZ8XjtiEDevpuk9EDkdkJ1wzkck:BcAyMmYavy/EA2F/feAEhevN+Stk |
TLSH: | EFC38DA134EE90BBC91D99F2FD1EF7A152F47C25CC8E6E95907F24646CE88F008966C1 |
File Content Preview: | MIME-Version: 1.0..Date: Wed, 18 Dec 2024 19:30:40 +0100..From: Robert Hain <hain@laurierpartners.com>..Subject: Laurier Partners Proposal..Thread-Topic: Laurier Partners Proposal..Importance: high..X-Priority: high..Message-ID:.. <PR3PR07MB65543EC349B1CC |
Subject: | Laurier Partners Proposal |
From: | Robert Hain <hain@laurierpartners.com> |
To: | Robert Hain <hain@laurierpartners.com> |
Cc: | |
BCC: | |
Date: | Wed, 18 Dec 2024 19:30:40 +0100 |
Communications: |
|
Attachments: |
|
Key | Value |
---|---|
MIME-Version | 1.0 |
Date | Wed, 18 Dec 2024 19:30:40 +0100 |
From | Robert Hain <hain@laurierpartners.com> |
Subject | Laurier Partners Proposal |
Thread-Topic | Laurier Partners Proposal |
Importance | high |
X-Priority | high |
Message-ID | <PR3PR07MB65543EC349B1CC1352EF9CD6D2052@PR3PR07MB6554.eurprd07.prod.outlook.com> |
To | Robert Hain <hain@laurierpartners.com> |
Content-Type | multipart/related; boundary="_F7BCBB2D-FC51-2949-A7A3-E30053E92F3D_" |
Icon Hash: | 46070c0a8e0c67d6 |
Document Type: | MHTML |
Number of OLE Files: | 1 |
Has Summary Info: | |
Application Name: | |
Encrypted Document: | False |
Contains Word Document Stream: | False |
Contains Workbook/Book Stream: | False |
Contains PowerPoint Document Stream: | False |
Contains Visio Document Stream: | False |
Contains ObjectPool Stream: | False |
Flash Objects Count: | 0 |
Contains VBA Macros: | False |